Two days ago, the breakdown of the Bill and Melinda Gates' marital relationship and the impending division of their assets over a whopping $130 billion received a great deal of attention in the country. Bill Gates has publicly sung the praises of Bitcoin and his comments have been quoted and reposted by the insider media on numerous occasions, so the divorce news has created an equally big storm among the blockchain community.
However, I am more concerned with issues that are of practical relevance to us than the news of $130 billion in assets and Bill Gates singing the praises of Bitcoin. For example, behind the news sweeping the world is the issue of information leakage faced by many online celebrities.
As the former richest man in the world, it is not surprising that Bill Gates' private life has received a lot of attention due to his high profile, but in today's era of big data, the issue of information disclosure has already begun to reach out to ordinary people.
Security is king in the battle for users
With the in-depth implementation of the real-name system on the Internet, many users' personal information has been deeply bound to their accounts in mobile phones, computers and other devices; storing personal information digitally on the Internet has indeed brought convenience to users' daily lives, but it has also further amplified the risk of information leakage.
360 Group mobile security researcher Yu Kui has said that, to some extent, identity information, payment information and other checks are the device and account data, not the person himself; that is, as long as whoever has the information of others, they can easily achieve identity impersonation.
In recent years, it is not uncommon for various Internet projects to suffer losses of user funds and reputation due to hacking of platforms or leaks of secrets by insiders, etc. Under such circumstances, blockchain technology, which is inherently anonymous and decentralised, is considered to be the key to solving the problem of network trust and information security.
The anonymity of blockchain technology can indeed alleviate the problem of leakage of users' personal information to a certain extent, but don't forget that most of the current blockchain industry projects have strong financial attributes.
As the saying goes, "where there are people, there are rivers and lakes", and in the online environment, "where there is money, there are hackers", and there are only a few cases where projects in the blockchain industry have been hacked, resulting in the loss of a large amount of user assets. This shows that even with the support of blockchain technology, the risk of user accounts remains high.
With the further expansion of the industry, user account security will become a key point for the development of the industry, and users need more secure, efficient and stable encryptable identity verification products.
Based on these premises, I recently came across a very special project called DPAS (Distributed Password Authentication), which, according to the official introduction, is the world's first distributed blockchain decentralised password authentication system that meets digital financial standards. This product is still in its initial run, but has already received a lot of attention both at home and abroad.
Global ingenuity, higher returns
According to its project-related introduction, DPAS should be the first team in the world to get involved in cryptographic identity verification, and so far, I have not found any competitors of DPAS, which means that this project is currently an original project in the industry, and usually, original projects will have a great user advantage.
So how exactly should this system be used? To better understand the logic of how DPAS works, I have also studied the white paper on the project, which states:
By loading the DPAS program, both individual users and platform users do not need to invest any additional capital, but only need to enter the security code to gain revenue; in the process of using the system, users do not need to bear any commission, and hardly incur any additional load, but the revenue may be accumulated infinitely; thus, it can be seen that the DPAS system has the advantage of low cost and high output in the process of using.
Of course, as a cryptographic authentication system, I am more concerned about its performance in terms of user data security. The white paper shows that DPAS has servers all over the world to provide encryption and decryption services, and this service is done independently without touching any private data of users or the platform.
We can think of DPAS as a lock whose cylinder is constantly being changed and accordingly the key in the lock owner's hand is constantly updated so that when the user needs to open the lock, it can only be opened with the latest key.
Only the latest password can be used for account verification. This mechanism effectively avoids the risk of a single password being stolen; it is worth mentioning that the password program is offline and does not require an Internet connection to work, which further ensures the security of the password.
In addition, in terms of privacy protection, DPAS also adopts a secondary encryption and two-way authentication. DPAS has a secondary encryption for each identity, and only with a query key can a data subject view information on transactions in the supply chain as well as product information; users can also only query the data of credit subjects in the DPAS system through two-way authentication.
A new track is emerging and who can lead the way
As the application layer continues to expand, blockchain technology is gradually docking to the multiple markets of the Internet, and in the Internet scene, the battle for users is inevitable, and big data analysis has become an important means of expansion for various enterprises and projects.
In this battle for users, Tencent, which has hundreds of millions of users, was the first to start to get involved in the blockchain industry. Wang Zongyou, the head of Tencent's blockchain, positioned blockchain technology as a value link between enterprises and institutions, and currently Tencent's blockchain has applications in many places, such as red envelopes, depository certificates, games and Shenzhen's blockchain invoices.
Wang Zongyou also said at the meeting that "the most important direction of blockchain technology application at present is to solve the problem of enterprises coming to the chain more easily. A portal, Email and QQ with only one user is not viable, and similarly an isolated enterprise in the chain is also meaningless".
As Wang Zongyou said, the future of blockchain will not be a single user, nor will there be only a single application. As the blockchain technology landing process advances, more and more application layers will be on the chain, user data will achieve explosive growth, and the encrypted identity verification track will gradually take shape.
On April 25, core members of the DPA community had said in the community that "the distributed cryptographic identity verification track, as a future hotspot, will only bring a new wave of boom if there is innovation at the application level". In the identity security verification track, user volume and high carrying capacity will also be the main competitiveness of becoming various projects.
The DPA, mentioned in this article, is also the first project in the world to enter into the encrypted identity verification system, so as the leader on the track, DPA will certainly be the first to eat a large number of user dividends, and even with the support of a large number of users, DPA will most likely become another dark horse project out of the circle this year.
In 2020, the DEFI track set off a boom in the industry, and the NFT concept was red-hot at the beginning of this year. It seems that there is never a shortage of new hot topics in the blockchain industry, so can DPAS, which has already started to lead the identity security verification track, bring a new feast to the blockchain industry?
I believe that the market is where the public is looking.
Disclaimer: This article is reproduced from other media. The purpose of reprinting is to convey more information. It does not mean that this website agrees with its views and is responsible for its authenticity, and does not bear any legal responsibility. All resources on this site are collected on the Internet. The purpose of sharing is for everyone's learning and reference only. If there is copyright or intellectual property infringement, please leave us a message.
©copyright2009-2020New York Fashion News Contact Us SiteMap